As the person responsible for your organization's network configuration, you need to enable remote employees to access internal resources and the wider web from their residence. Which connection strategy allows for secure access to corporate assets without unnecessarily consuming the organization's network bandwidth for non-corporate internet usage?
Utilize a method that channels only remote workplace communication through the required security protocols and infrastructure, while ordinary internet requests bypass these routes.
Arrange for a default remote access setup without stipulating the traffic direction, relying on the network's automatic detection to decide on the appropriate security measures.
Enable a policy to let data for specific applications such as email and real-time communication tools pass through centralized security mechanisms, disregarding the type of network requested.
Adopt a strategy where all data, irrespective of its destination, is encrypted and passed through the organization's centralized networking equipment.